Keywords

EncryptionHomomorphic encryptionComputer scienceKey (lock)Quadratic equationTheoretical computer scienceScheme (mathematics)Set (abstract data type)Learning with errorsPublic-key cryptographyDiscrete mathematicsAlgorithmArithmeticMathematicsComputer securityProgramming language

Affiliated Institutions

Related Publications

Cryptanalysis of the Chor-Rivest cryptosystem

Knapsack-based cryptosystems used to be popular in the beginning of public key cryptography before being all broken, all but the Chor-Rivest cryptosystem. We show how to break t...

1998 Lecture notes in computer science 32 citations

Publication Info

Year
2005
Type
book-chapter
Pages
325-341
Citations
1654
Access
Closed

External Links

Social Impact

Social media, news, blog, policy document mentions

Citation Metrics

1654
OpenAlex

Cite This

Dan Boneh, Eu-Jin Goh, Kobbi Nissim (2005). Evaluating 2-DNF Formulas on Ciphertexts. Lecture notes in computer science , 325-341. https://doi.org/10.1007/978-3-540-30576-7_18

Identifiers

DOI
10.1007/978-3-540-30576-7_18